I need to hide my activity and IP address from those I share this network with. I'm unsure if a VPN will serve my needs, because I'm not concerned about the sites I access tracking me. I'm concerned ...

My residence provide wifi and I'm using my personal computer to connect to it. I use a login and password to have access to internet. Some websites are blocked on it.
Sometimes I log into VPN(using ...

Sorry I'm pretty clueless with this stuff..
I know that vpn hides your IP address when just browsing websites, but how about submitting an online form, such as when you send an inquiry?
Would my IP ...

It's often recommended that you should use a VPN when using unsecured or untrusted networks, such as open public wifi or secured wifi that you don't control. What are the advantages to using a VPN on ...

I'm a little confused about how VPNs work ... I read that they provide an end-to-end encrypted tunnel between you and whoever you're trying to connect to but is that actually the case?
VPNs let you ...

There may be a basic flaw in my understanding of how the internet works so sorry if this is a simple question. What type of attack does VPN protect against? For example if a local area network (let's ...

So, let's say one just doesn't want the government/corporations to know what they are doing online. Let's say, for example, that they just don't trust the NSA, FBI, Google, etc.
So what are the steps ...

Let's say I had a Gmail account. Should I just not have a Gmail account, or should I not use their cookies? How bad are the cookies, in of themselves? I obviously wouldn't log into it, with my VPN or ...

I can't quite figure out the differences between using the Tor browser and using a VPN (like concretely proXPN). From what I understand the idea is the same, that they both hide the IP address. The ...

For privacy issues, I decided to subscribe in a VPN connection using one of the known VPN providers.
However, I am still have some concerns regarding the privacy and the connection security using VPN:
...

I've looked at a lot of VPNs, and "what's my ip address" sites confirm that outsiders can't tell where I really am when I'm using them, but I haven't been able to get my own WiFi yet, so I don't know ...

Today I started using a VPN on my phone (nexus 5), and after I switched on mobile data and turned off my WiFi, I received a text message from my carrier offering me roaming packages for Europe (which ...

I try to understand what happens when I use an HTTP(S) proxy in my OpenVPN client configuration.
What's the advantage of an HTTPS proxy over plain HTTP? In any case the encryption takes place on the ...

what are the different ways to become anonymous. Is quicksilver a good email for that? What are the different options?
I know about proxies, Tor, and VPNs. Should I do all three? I like computers but ...

A friend of mine wants to use a VPN on his school's Wi-Fi becuase they've blocked many applications such as Skype, etc.
My question is, if he uses a VPN (with iOS 7) will the system administrators be ...

Our network admin has requested that a single remote employee purchase a separate modem in their house for "work" traffic. I question if this is a legitimate security practice of any kind especially ...

I have a client that wants me to begin doing research on finding the origin of a persistent attacker to their network and employees. I haven't gotten the specifics yet, but I'm trying to think of ways ...

I´m building a enterprise application and I need to create a secure communication between android and a server. What is the most secure way to do End-to-End communication? Should I use HTTPS or VPN? ...

I would like to make this story as short as possible since my question is not that long, I have worked with journalists previously in war zone where we investigated the involvement of EU IT companies ...

It's clear that someone listening on a network could still find out what website I visit over HTTPS (as discussed here) but what about when surfing in a VPN? What exactly can the underlying network ...

I want to run a TOR node using a small ARM device mini server. I already have a good firewall set but feel a bit uncomfortable when giving away my IP address to the open web by opening a port. If I ...

VPNs are accessed by the user with credentials so that the information is encrypted. There are credentials that you download to allow this. Since you don't physically, in person get the credentials ...

I have some questions about squid proxies, we set a squid proxy server to block certain web sites for users. and some users only can access one website that related to our work.but after install some ...

We currently run a Cisco ASA 5510 and a RSA token to authenticate users to our network for VPN access. The company is trying to start BYOD but would like to make sure that the PC has been approved by ...

I subscribed to a VPN service recently, and installed wireshark to take a look at the traffic sent from my computer.
Practically all of it goes through UDP protocol, encrypted. But there are two HTTP ...

when i go to whatsmyip.org under my host name i get "Your.Ipv6.Is.Under.Attack.By.The.Smurf6.Info" what does this mean? I'm using private internet access as my vpn so i'm guessing PIA is under some ...

According to Browsec's website this application can be used to Bypass firewalls. So in countries like Iran it seems a useful tool to bypass censorship and filtering.
For start using this application ...

Just trying to get some general sense about the security on internet now-a-days.
There are so many websites I go and comment on different things. If some comments are political and they don't like, I ...